• Inventy@editormails.com


Volume 1 ~ Issue 12



Volume 1 ~ Issue 12
1.Full Citation
Manuscript Id :: 13030
Manuscript Type :: Research
Manuscript Title :: Performance of Steel Fiber Reinforced Concrete
Country :: Badnera India
Authors :: Milind V. Mohod
Pages No. :: 01-04
Paper Index :: : 07.4721/0112001004
Full PDF ::
Cement concrete is the most extensively used construction material in the world. The reason for its extensive use is that it provides good workability and can be moulded to any shape. Ordinary cement concrete possesses a very low tensile strength, limited ductility and little resistance to cracking. Internal micro cracks, leading to brittle failure of concrete. In this modern age, civil engineering constructions have their own structural and durability requirements, every structure has its own intended purpose and hence to meet this purpose, modification in traditional cement concrete has become mandatory. It has been found that different type of fibers added in specific percentage to concrete improves the mechanical properties, durability and serviceability of the structure. It is now established that one of the important properties of Steel Fiber Reinforced Concrete (SFRC) is its superior resistance to cracking and crack propagation. In this paper effect of fibers on the strength of concrete for M 30 grade have been studied by varying the percentage of fibers in concrete. Fiber content were varied by 0.25%, 0.50%, 0.75%, 1%, 1.5% and 2% by volume of cement. Cubes of size 150mmX150mmX150mm to check the compressive strength and beams of size 500mmX100mmX100mm for checking flexural strength were casted. All the specimens were cured for the period of 3, 7 and 28 days before crushing. The results of fiber reinforced concrete for 3days, 7days and 28days curing with varied percentage of fiber were studied and it has been found that there is significant strength improvement in steel fiber reinforced concrete. The optimum fiber content while studying the compressive strength of cube is found to be 1% and 0.75% for flexural strength of the beam. Also, it has been observed that with the increase in fiber content up to the optimum value increases the strength of concrete. Slump cone test was adopted to measure the workability of concrete. The Slump cone test results revealed that workability gets reduced with the increase in fiber content.

Key words:  Compressive strength, Flexural strength, Hooked end steel fiber, Optimum Value, Steel fiber reinforced concrete, Workability.
[1]. ACI committee 544, 3R-08, 2008. "Guide for specifying, proportioning, and production of fibre reinforced concrete." American concrete institute, Farmington hills, USA.
[2]. N. Janesan, P. V. Indira and S. Rajendra Prasad, 2010: "Structural behaviour of steel fibre reinforced concrete wall panels in two-way is plane action." Indian concrete journal.
[3]. Rui D. Neves and Joao C. O. Fernandes de Almeida, 2005. "Compressive behaviour of steel fibre reinforced concrete", structural concrete. 2005-06. No. 1.
[4]. Indian standard code of practice for specification for coarse and fine aggregate from natural sources for concrete, IS 383: (1970), Bureau of Indian standards, New Delhi.
[5]. Indian standard code of practice for recommended guidelines for concrete mix design, IS 10262: 2009, Bureau of Indian standards, New Delhi.
[6]. Indian standard code of practice for plain and reinforced concrete IS 456: 2000, Bureau of Indian standards, New Delhi.

2.Full Citation
Manuscript Id :: 15017
Manuscript Type :: Research
Manuscript Title :: Benefits of Management Information System in Blood Bank
Country :: Rajasthan, India
Authors :: Vikas Kulshreshtha|| Dr. Sharad Maheshwari
Pages No. :: 05-07
Paper Index :: : 07.4721/0112005007
Full PDF ::
This paper discuss about the benefits of management information system in blood bank. Management information system plays an important role in the development of the projects. In today's world of information most of the systems are transforming into the management information system. The paper is basically focussed on the blood bank management information system. It discuss about the beneficiaries of the blood bank management information system. It plays a vital role in the blood bank as blood is the necessity of everyone.

Keywords –   Management Information System, Blood Bank
[1] http://www.occ.gov/publications/publications-by-type/comptrollers-handbook/mis.pdf
[2] J. Scott Armstrong (1986). "The Value of Formal Planning for Strategic Decisions: A Reply". Strategic Management Journal 7: 183–185.
[3] Polack, Jennifer (December 2009). "Planning a CIS Education Within a CS Framework". Journal of Computing Sciences in Colleges 25 (2): 100–106. ISSN 1937-4771.
[4] Hayes, Helen; Onkar Sharma (February 2003). "A decade of experience with a common first year program for computer science, information systems and information technology majors". Journal of Computing Sciences in Colleges 18 (3): 217–227. ISSN 1937-4771. "In 1988, a degree program in Computer Information Systems (CIS) was launched with the objective of providing an option for students who were less inclined to become programmers and were more interested in learning to design, develop, and implement Information Systems, and solve business problems using the systems approach".
[5] Cohen MA, Pierskalla WP: Management policies for a regional blood bank. Transfusion 1975; 15:58–67
[6] Cohen MA, Pierskalla WP: Target inventory levels for a hospital blood bank or a decentralized regional blood banking system. Transfusion 1979;19:444–454

3.Full Citation
Manuscript Id :: 14104
Manuscript Type :: Research
Manuscript Title :: Return on Investment in Skilling- Bulk Material Handling System (BMHS) focus
Country :: India
Authors :: Dr. R. S. P. Singh|| Y. P. Chawla
Pages No. :: 08-17
Paper Index :: : 07.4721/0112008017
Full PDF ::
USD 1.4 Trillion worth of Investments in India's Infrastructural sector along with other major investments in Power, Steel, Cement and other similar high GDP growth sectors,has brought in Bulk Material Handling Systems ( BMHSs) to an important front stage. The Skill Shortage in India in this sector, like any other high Skills in various technological sectors,also prevalent in many other countries, is the issue which is as important like, buying a Costly BMHS. Expansion in Power Sector (consequential increase in Coal Imports), Steel, Cement and similar infrastructure sectors necessitates the expansion of BMHSs. The need of pouching an employee from competitors' yard, or re-skilling the own staff, or skilling fresh candidateswith the required skills or even making the candidates ready for meeting market needs for India or abroad ( at this time of skilled and employable shortage of youth in many countries) needs an analysis on Return on Investment on the Skilling.

Keywords:   Bulk Material Handling System, Skills, Return on Investment on Skilling,

[1]. Encyclopedia Britannica
[2]. K. Gopal, Director – Sales. TAKRAF India Pvt. Ltd
[3]. Mike Ogle Material Handling Industry of America
[4]. Pitt-Catsouphes, M., M. A. Smyer, C. Matz-Costa, and K. Kane. 2007. The National Study Report: Phase II of the National Study of Business Strategy and Workforce Development. The Center on Aging & Work/Workplace Flexibility Research Highlight No. 04.http://agingandwork.bc.edu/documents/RH04_NationalStudy_03-07_004.pdf
[5]. Shomnit Sengupta Foie- Grass- like Training

4.Full Citation
Manuscript Id :: 12078
Manuscript Type :: Research
Manuscript Title :: Feature Extraction for Image Retrieval using Image Mining Techniques
Country :: Hydearabad India
Authors :: Madhubala Myneni||Dr.M.Seetha
Pages No. :: 18-24
Paper Index :: : 07.4721/0112018024
Full PDF ::
In this paper feature extraction process is analyzed and a new set of integrated features are proposed for image retrieval. In image retrieval system, the content of an image can be expressed in terms of different features as color, texture and shape. This paper emphasizes on feature extraction algorithms and performance comparison among all algorithms and image mining techniques for converting low level semantic characteristics into high level features. The primitive features are extracted and compared with data set by using various feature extraction algorithms like color histograms, wavelet decomposition and canny algorithms. In this paper feature integration has restricted to five different methodologies of feature Integration: shape only, color only, texture only, color and texture only, and structure, color and texture. It is ascertained that the performance is superior when the image retrieval based on the super set of integrated features, and better results than primitive set. (Super set and primitive is not used anywhere in the paper.).

Keywords:   Feature Extraction, Feature Integration, Image Retrieval, Image Mining

[1]. A.W.M. Smeulders, et. al. Content-based imageretrieval at the end of the early years, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 22, no. 12,2000, pp. 1349.
[2]. Castelli, V. and Bergman, L. D., Image Databases: Search and Retrieval of Digital Imagery, 2001, John Wiley & Sons, Inc.
[3]. Craig Nevill-Manning (Google) and Tim Mayer (Fast). Anatomy of a Search Engine, Search Engine Strategies Conference, 2002.
[4]. Daubechies, I., Ten Lectures on Wavelets, Capital City Press, Montpelier, Vermon.t,1992.
[5]. Drimbarean A. and Whelan P.F. Experiments in color texture analysis, Pattern Recognition Letters, 22:2001, 1161-1167.
[6]. Hedman, K.; Stilla, U.; Lisini, G.; Gamba, P. , Road Network Extraction in VHR SAR Images of Urban and Suburban Areas by Means of Class-Aided Feature-Level Fusion, Geoscience and Remote Sensing, IEEE Transactions , vol.48, no.3, pp.1294-1296, March 2010.
[7]. Hui Kong; Audibert, J.-Y.; Ponce, J. , General Road Detection From a Single Image, Image Processing, IEEE Transactions , vol.19, no.8, pp.2211-2220, Aug. 2010.

5.Full Citation
Manuscript Id :: 15052
Manuscript Type :: Research
Manuscript Title :: Conficker Botnet Prevention: Crypto-Pan Algorithm
Country :: India
Authors :: S.Aanjan Kumar
Pages No. :: 25-29
Paper Index :: : 07.4721/0112025029
Full PDF ::
This paper measure the potential power of Conficker to estimate its effects on the networks/hosts when it performs malicious operations. Isolating the BotNet traffic from regular traffic makes sharing of the data possible. It uses Address anonymization can be done by Cryptography-based Prefix preserving Anonymization algorithm (Crypto-Pan) to control the attack of Conficker botnet. The above method for anonymizing has many benefits. Crypto-PAn is a cryptography-based sanitization algorithm for network trace owners to anonymize the IP addresses of Conficker botnet and their traces in a prefix-preserving manner.

Keywords -   Bot , Botnet, Conficker, Crypto-Pan, Botnet defense.

[1] S. Shin and G. Gu. "Conficker and Beyond". In Proceedings of 2010 Annual Computer Security Applications Conference (ACSAC), Dec. 2010.
[2] SRI-International. An analysis of Conficker C. http://mtc.sri.com/ Conficker/addendumC/.
[3] B. Stock, M. E. Jan Goebel, F. C. Freiling, and T. Holz. Walowdac Analysis of a Peer-to-Peer Botnet. In Proceedings of European Conference on Computer Network Defense (EC2ND), Nov. 2009.
[4] B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna. Your Botnet is My Botnet: Analysis of a Botnet Takeover. In Proceedings of ACM CCS, Nov. 2009.
[5] M. S. Techcenter. Conficker worm. http://technet.microsoft.com/en-us/ security/dd452420.aspx.
[6] Verisign. The Domain Name Industry Brief. http://www.verisign.com/domain-name-services/domain-information-center/domain-name-resources/domain-name-report-sept09.pdf.
[7] D. Watson. Know Your Enemy: Containing Conficker.http://www.honeynet.org/papers/conficker.
[8] Y. Xie, F. Yu, K. Achan, E. Gillum, M. Goldzmidt, and T. Wobber. HowDynamic are IP Addresses? In Proceedings of ACM SIGCOMM, Aug.2007.
[9] Y. Xie, F. Yu, K. Achan, R. Panigraphy, G. Hulte, and I. Osipkov. Spamming Botnets: Signatures and Characteristics. In Proceedings of ACM SIGCOMM, Aug. 2008.
[10] J. Xu, J. Fan, M. H. Ammar, and S. B. Moon, "Prefix-Preserving IP Address Anonymization: Measurement-based Security Evaluation and a New Cryptography-based Scheme," in IEEE International Conference on Network Protocols (ICNP), 2002.

6.Full Citation
Manuscript Id :: 15057
Manuscript Type :: Research
Manuscript Title :: Analysis of Cooling Gas Compressors Discharge Silencer
Country :: Pune, India
Authors :: Dr. S. B. Wadkar||Viraj Ghogre
Pages No. :: 30-36
Paper Index :: : 07.4721/0112030036
Full PDF ::
Discharge silencer are used with rotary compressors to avoid flow fluctuations of gas. In this paper an industrial problem of discharge silencer is discussed. A discharge silencer connected to a cooling gas compressor developed cracks at various locations on its body and supports. The vibration and noise levels of the system were very high. To find out the root causes of the high level of vibration measured on the discharge silencer, it was decided to carry out a CAE based investigation along with comparative study of the actual vibration on site measurements. Hyper-mesh with shell elements is used for meshing the various design models and modal analysis of the structure is done using Radioss as a solver. The response of the discharge silencer under dynamic loading condition through transient dynamic analysis is done using Ls-Dyna as a solver. Hyper-view is used for post-processing of the modal analysis results.

Keywords –  
Finite element modeling, Modal analysis, Transient analysis, Vibrations.

[1]. Archer, J.S "Natural Vibration Modal Analysis" National Aeronautics and Space Administration, September 1968, http://www.zerognews.com
[2]. Z. Wu, W. Zhou, H. Li, "Modal Analysis for Filament Wound Pressure Vessels Filled With Fluid", Composite Structures, 2010, pp 1994–1998.
[3]. M. H. Toorani, A. A. Lakis, "Shear Deformation in Dynamic Analysis of Anisotropic Laminated Open Cylindrical Shells Filled With Oor Subjected to a Flowing Fluid", Computer Methods in Applied Mechanics and Engineering 2001, pp 4929-4966.
[4]. A. Di Carluccio, G. Fabbrocino , E. Salzano, G. Manfredi, "Analysis of Pressurized Horizontal Vessels Under Seismic Excitation", The 14th World Conference on Earthquake Engineering , 2008, pp 12-17.
[5]. Stephen Tiernan, Martin Fahy, "Dynamic FEA Modeling of ISO Tank Containers", Journal of Materials Processing Technology, 2002, pp126–132.

7.Full Citation
Manuscript Id :: 15028
Manuscript Type :: Research
Manuscript Title :: Fuzzy Game Value by Dominance Principle
Country :: India
Authors :: Dr.C.Loganathan||M.S.Annie Christi
Pages No. :: 46-49
Paper Index :: : 07.4721/0112046049
Full PDF ::

When there is no saddle interval, applying the dominance principle, we determine the value of the
game for the interval valued fuzzy game matrix by reducing the size of the given matrix.

Key Words:   Dominance, fuzzy game, interval arithmetic, interval valued matrix.


[1] Loganathan.C and Annie Christi.M.S, Fuzzy Game Value of the Interval Matrix, International Journal of Engineering Research and
Applications, Vol: 2, Issue 5, (2012).
[2] Madhumangal Pal and Prasun K. Nayak, Solutions of m n Rectangular Fuzzy Games by dominance, (2004).
[3] Porchelvi.T and Stephen Dinagar D, Fuzzy Dominance Principle, International journal of Algorithms, Computing and Mathematics,
Volume 3, (2010).
[4] Van Neumann and Morgenstern.O, Theory of games and Economic Behaviour, Princeton. N.J. Princeton University press, (1944).

8.Full Citation
Manuscript Id :: 15025
Manuscript Type :: Research
Manuscript Title :: Fatty Acid Methyl Esters Characteristic and Esterification of Some Vegetable Oils for Production of Biodiesel
Country :: Tamilnadu.India
Authors :: Jesikha. M,
Pages No. :: 50-53
Paper Index :: : 07.4721/0112050053
Full PDF ::

Biodiesel is a cleaner burning fuel than diesel and a suitable replacement. It is made from non-toxic, biodegradable, renewable resources, such as new and used cooking oil and non edible oil. In this study oil sources were obtained from the seeds of Ricinus commonis, Cocos nucifera, Brassica juncea, Arecaceae Elaels, Helianthus annus Linn, Madhuca longifolia, Pongamia pinnata oils. Biofuel Characteristics such as free fatty acid content, Iodine value, saponification value, cetane number, energy value and density were studied. Productions of Fatty Acid Methyl Ester by Transesterification of oil samples were recovered. The results validate that all these samples are can used as sources for biodiesel production.

Key Words:   Biodiesel, saponification value, cetane number, Transesterification.


[1]. D. P. Geller and J. W. Goodrum, Effects of specific fatty acid methyl esters on diesel fuel lubricity, Fuel, 83(17–18), 2004, 2351–2366.
[2]. 2. P. D. Tyagi and K. K. Kakkar, Non-conventional vegetable oils. New Delhi: Batra book Service; 1991.
[3]. K. Manickam and S. Sadasivam, Fundamental of Biochemistry analysis, 1984.
[4]. J. V. Gerpen, Cetane Number Testing of Biodiesel, Journal of the American Oil Chemists' Society, 67(9), 2004, 565-571.
[5]. R. P. S. Katwal and P. L. Soni, Biofuels: an opportunity for socioeconomicdevelopment and cleaner environment, Indian Forester, 129(8), 2003, 939–949.
[6]. K. A. Krisnangkura, simple method for estimation of Cetane index of vegetable oil methyl esters, Journal of American Oil Chemical Society, 63, 1986, 552–563.
[7]. K. J. Harrington, Chemical and physical properties of vegetable oil esters and their effect on diesel fuel performance, Biomass, 9, 1986, 1–17.

9.Full Citation
Manuscript Id :: 15012
Manuscript Type :: Research
Manuscript Title :: Biodegradation of Azo Dye Reactive Red BL by Alcaligenes Sp. AA09
Country :: Tamilnadu India
Authors :: Ajay Kumar Pandey||Vinay Dubey
Pages No. :: 54-60
Paper Index :: : 07.4721/0112054060
Full PDF ::

A dye-decolorizing bacterium strain was isolated from activated sludge of a textile printing wastewater treatment plant of Perundurai. The strain was identified as Alcaligenes sp. AA09 based on Gram staining and sequence analysis of 16S rDNA gene. Alcaligenes sp. AA09 decolorized more than 90% of the azo dye reactive red BL within 24 h under aerobic condition at pH 7.0 and temperature 250C with 50-200mg/l dye concentration. A 60Kd NADH/NADPH-dependent, oxygen sensitive, soluble cytosolic enzyme, azoreductase was responsible for degradation of reactive red BL azo dye. The bacterial dye degradation was confirmed by analysis of the degraded products using TLC and GC-MS analysis.

Key Words:   Biodegrdation, Reactive Red BL, Aerobic, Decolorization, Azo dyes, Azoreductase, phytotoxicity


[1]. Resmi C. Senan & T. Emilia Abraham, Bioremediation Of Textile Azo Dyes By Aerobic Bacterial Consortium, Biodegradation, 15, 2004, 275–280. [2]. Adedayo, S. J. C. W.A. Taylor And M.Y. Anderso, Decolourization And Detoxification Of Methyl Red By Aerobic Bacteria From A Wastewater Treatment Plant, World Journal Of Microbiology & Biotechnology, 20, 2004, 545- 550.
[3]. Hong, Y. And J. Guo, Reduction And Partial Degradation Mechanisms Of Naphthylaminesulfonic Azo Dye Amaranth By Shewanella Decolorationis S12, Applied Microbial Biotechnology, 75, 2007, 647-654.
. Husseiny Sh. M, Biodegradation Of The Reactive And Direct Dyes Using Egyptian Isolates, Journal Of Applied Sciences Research, 4, 2008, 599-606.
[5]. Guo, J, J. Zhou, And D. Wang, A Novel Moderately Halophilic Bacterium For Decolorizing Azo Dye Under High Salt Condition, Biodegradation, 19, 2008, 15-19.

10.Full Citation
Manuscript Id :: 15027
Manuscript Type :: Research
Manuscript Title :: A Result based comparison of DSDV, AODV and DSR routing protocols
Country :: Nagpur India
Authors :: Prof. Nilesh U. Sambhe ||Prof. Sagar S. Badhiye
Pages No. :: 61-64
Paper Index :: : 07.4721/0112061064
Full PDF ::

Mobile Ad Hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any centralized administration, in which individual nodes cooperate by forwarding packets to each other to allow nodes to communicate beyond direct wireless transmission range. Routing protocols of mobile ad-hoc network tend to need different approaches from existing Internet protocols because of dynamic topology, mobile host, distributed environment, less bandwidth, less battery power. Ad Hoc routing protocols can be divided into two categories: table-driven (proactive schemes) and on-demand routing (reactive scheme) based on when and how the routes are discovered. In Table-driven routing protocols each node maintains one or more tables containing routing information about nodes in the network whereas in on-demand routing the routes are created as and when required. The table driven routing protocols is Destination Sequenced Distance Vector Routing protocols (DSDV).The on-demand routing protocols are Ad Hoc On-Demand Distance Vector Routing (AODV), Dynamic Source Routing (DSR).Here we compare these protocols different parameters such as packet delivery fraction, good put(average throughput),energy consumed( in Joules) and the no of forwardline used and compare the performance of these routing protocols using NS2 environment.



[1] Kapil Suchdeo, Durgesh Kumar Mishra, "Comparison of On-Demand Routing Protocols" 2010 Fourth Asia International Conference on Mathematical/Analytical Modelling and Computer Simulation, 978-0-7695-4062-7/10 ,2010 IEEE
[2] Nor Surayati, Mohamad Usop, Azizol Abdullah"Performance Evaluation of AODV, DSDV & DSR Routing Protocol in Grid Environment" IJCSNS International Journal of Computer Science and Network Security, 9, No.7, July 2009.
[3] David B. Johnson, "Routing in Ad hoc Networks of Mobile Hosts", Proc IEEE Workshop on Mobile Computing Systems and Applications.
[4] Elizabeth M. Royer, Chai-Keong Toh, "A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks", Proc. IEEE, 1999.
[5] Runcai Huang, Yiwen Zhuang, Qiying Cao "Simulation and Analysis of Protocols in Ad Hoc Network", 2009 International Conference on Electronic Computer Technology, 978-0-7695-3559-3/09 ,2009 IEEE.

11.Full Citation
Manuscript Id :: 15046
Manuscript Type :: Research
Manuscript Title :: Experimental Studies On Electrochemical And Biosorption Treatment Of Effluent Containing Nitrobenzene And Optimization Using Rsm
Country :: India
Authors :: Mr.P.SivaKumar||Mr.S.Karthikeyan||Dr. D.Prabhakaran,||Dr.T.Kannadasan
Pages No. :: 65-72
Paper Index :: : 07.4721/0112065072
Full PDF ::

A novel process combining Electrochemical Oxidation and Biosorption treatment was presented for Nitrobenzene abatement. The electrochemical oxidation was investigated batch-wise in the presence of NaCl (2g L-1) electrolyte with lead as anode and copper as cathode electrodes. The conditions were optimized using response surface methodology (RSM), which result in 76.4% reduction of COD was found to be maximum and the optimum conditions were satisfied at current density 3.56 A dm-2, time 3 hours, flow rate 40 L hr -1, volume 9 L occur at minimum power consumption of 30.3 kWhr / kg COD. It is followed by biosorption treatment in the presence of biosorbents such as maize and rice stems at 15 g L-1. From this study it was observed that the maximum % of COD reduction was 97.7 % for the optimized time 4 days and volume 6 L for pretreated effluent containing nitrobenzene.

Key Words:   Biosorption, COD reduction, Electrochemical, Maize & Rice stem.


[1] Hartter, D. R. (1985). The Use And Importance Of Nitroaromatic Chemicals In The Chemical Industry. In Toxicity Of Nitroaromatic Compounds. Chemical Industry Institute Of Toxicology Series (Ed. D. E. Rickert), Pp. 1-13. Hemisphere Publishing Corp.: Washington, D.C.
[2] Norvell Nelson, (2002), "Electrochemical Destruction Of Organic Hazardous Wastes", Platinum Metals Review., Vol.46, No.1, Pp.18-23
[3] Shengrui Wang, Suwen Yang, Xiangcan Jin, Liangke Liu, Fengchang Wu (2010) "Use Of Low Cost Crop Biological Wastes For The Removal Of Nitrobenzene From Water", Desalination, Volume 264, Pp 32-36.
[4] Sundstrom, D.W. Khel, H.B. And Rerdy, K.A. (1986) " ", Hazardous Waste Hazard Mat, Vol.3, Pp.101.
[5] Panizza, M. Bocca, P. Cerisola, G. (2000) "Electrochemical Treatment Of Wastewater Containing Polyaromatic Organic Pollutants", Water Research. 2000, Volume 34, Pp. 2601-2605.
[6] Radha .K.V, Sridevi .V And Kalaivani .K (2009) "Electrochemical Oxidation For The Treatment Of Textile Industry Wastewater", Bioresource Technology., Vol.100, Pp.987–990.
[7] Rajeshwar .K And Ibanez .J.G (1997), "Fundamentals And Application In Pollution Abatement, Academic Press", San Diego, CA,.

12.Full Citation
Manuscript Id :: 15036
Manuscript Type :: Research
Manuscript Title :: An Advance for Protection in Mobile Ad-Hoc Networks Using Contradict Method of Encryption
Country :: India
Authors :: Mr.S. Raghunath Reddy|| Mr.V.Biksham
Pages No. :: 73-77
Paper Index :: : 07.4721/xxxxxx
Full PDF ::

Security in any of the systems turned into a vital issue in this paper we have executed a security component on Medium Access Control layer by Assured Neighbor based Security Protocol to give validation and secrecy of bundles alongside High speed transmission for Ad hoc systems. Here we have partitioned the convention into two distinctive parts. The initial segment manages Routing layer data; in this part we have attempted to execute a conceivable methodology for identifying and separating the pernicious hubs. A trust counter for every hub is resolved which can be effectively expanded and diminished relying on the trust esteem with the end goal of sending the bundles from source hub to destination hub with the assistance of middle hubs. An edge level is additionally foreordained to identify the malevolent hubs. In the event that the estimation of the hub in trust counter is not exactly the edge esteem then the hub is signified 'noxious'. The second a portion of our convention manages the security in the connection layer. For this security reason we have utilized CTR (Counter) approach for validation and encryption. We have reproduced every one of our techniques and plans in NS-2, the aftereffect of which gives a conclusion that our proposed convention i.e. Guaranteed Neighbor based Security Protocol can perform high parcel conveyance against different gatecrashers furthermore bundle conveyance proportion against versatility with low postpones and low overheads.

Key Words: ---


[1]. Farooq Anjum, Dhanant Subhadrabandhu and Saswati Sarkar "Signature based Intrusion Detection for Wireless Ad-Hoc Networks: A Comparative study of various routing protocols" in proceedings of IEEE 58th Conference on Vehicular Technology, 2003.
[2]. Anand Patwardhan, Jim Parker, Anupam Joshi, Michaela Iorga and Tom Karygiannis "Secure Routing and Intrusion Detection in Ad Hoc Networks" Third IEEE International Conference on Pervasive Computing and Communications, March 2005.
[3]. Perkins.C.E, "Ad hoc Networking", Boston, Addison Wesley, 2001.

13.Full Citation
Manuscript Id :: 150460
Manuscript Type :: Research
Manuscript Title :: Web Personalization Using Web Mining
Country :: India
Authors :: G.Divya || Shaik Basha
Pages No. :: 65-72
Paper Index :: : 07.4721/xxxxxxxx
Full PDF ::

This Paper comprises of upcoming field of "Web Mining". Web mining is the application of data mining techniques to extract knowledge from web data, including web documents, hyperlinks between documents, usage logs of web sites, etc. In this paper we encompass various Pros and Cons of Web Mining and also represent the similarities and differences between Data Mining and Web Mining. Here we describe some of the recently used Tools used in Web Mining.

Key Words:  Web Mining, Data Extraction, Web Usage Mining, Web Content Mining, Web Structure Mining


[1]. A. A. Barfourosh, H.R. Motahary Nezhad, M. L. Anderson, D. Perlis, "Information Retrieval on the World Wide Web and Active Logic: A Survey and Problem Definition", 2002.
[2]. Cooley, R.; Mobasher, B.; Srivastava, J.; "Web mining: information and pattern discovery on the World Wide Web". In Proceedings of Ninth IEEE International Conference. pp. 558 –567, 3-8 Nov. 1997.
[3]. G. Shrivastava, K. Sharma, V. Kumar," Web Mining: Today and Tomorrow", in the Proceedings of 2011 3rd International Conference on Electronics Computer Technology (ICECT), pp.399-403, April 2011
[4]. B. Singh, H.K. Singh, "Web data Mining Research", in the Proceedings of 2010 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), pp. 1-10, Dec. 2010
[5]. O. Etzioni, "The world wide Web: Quagmire or gold mine. "Communications of the ACM, Vol. 39No. 11, pp. 65 -68, Nov.1996.
[6]. Web mining definition, available: http://en.wikipedia.org/wiki/Web_mining.
[7]. R. Kosala, H. Blockeel "Web mining research: A survey," ACM SIGKDD Explorations, Vol. 2 No. 1, pp. 1 -15, June 2000.